BitterRAT

Description

(Forcepoint) BITTER used free dynamic DNS (DDNS) and dedicated server hosting services in order to set up their C2s. The download site where the exploit documents download the RAT binaries are, in most cases, different from the actual RAT C2. However, both of them are typically registered using a Gmail email address and a spoofed identity purporting to be either from United Kingdom or Great Britain.

Names

Name
BitterRAT
Bitter RAT

Category

Malware

Type

  • Backdoor

Information

Malpedia

Other Information

Uuid

0e7f29c9-7c63-432a-aeb0-441aec1d43e4

Last Card Change

2022-12-28